Kyle David of KDG Explores the Role of AI at RKL Cyber Readiness Forum

Kyle David, President and CEO of KDG, recently addressed the RKL Cyber Readiness Forum, focusing on the transformative impact of artificial intelligence (AI) on workplace culture and cybersecurity strategies. Key Points Kyle David emphasised that AI serves as a catalyst for cultural change within organisations. His presentation highlighted AI’s role in enhancing operational efficiency and […]

Read More →

Using AI Both Helps And Hinders Cybersecurity

In the realm of cybersecurity, AI is a double-edged sword—it’s brilliant at bolstering security measures, yet can also create significant vulnerabilities. This article highlights how generative AI behaves in both beneficial and detrimental ways within security contexts. Key Points Microsoft’s Security Copilot uses generative AI for enhancing incident management but lacks ambitious innovation. Instances like […]

Read More →

Roundup of Eight Articles to Take AI Governance From Principles to Practice

This article dives into the shifting landscape of AI governance as it becomes increasingly integrated into business operations. It compiles eight key articles that offer practical insights into implementing AI governance frameworks while keeping in mind the latest global regulations like the E.U. AI Act and U.S. Executive Orders. These readings are essential for legal […]

Read More →

Cybersecurity breach exposes data of 38,000 University of Chicago Medicine patients

Summary A data breach at the University of Chicago Medicine potentially exposed the personal information of up to 38,000 patients. The unauthorised access occurred between July 5 and July 11, 2024, affecting crucial data such as names, addresses, dates of birth, Social Security numbers, and financial information. The Medical Group was informed about the breach […]

Read More →

You Need A Business Continuity Plan

In the realm of cybersecurity, the importance of having a solid business continuity plan (BCP) can’t be overstated. With threats like ransomware becoming increasingly common, companies must be prepared not just to prevent attacks, but also to respond effectively when they happen. This article by John Bruggeman outlines the crucial elements of a BCP and […]

Read More →

HHS-OCR Risk Analysis Enforcement Initiative Continues Under New Administration

The article discusses the continuation of the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) Risk Analysis Enforcement Initiative under a new administration. Since kicking off in October 2024, the initiative has led to settlement payments nearing $900,000 from multiple health care organisations that failed to adequately analyse their risk […]

Read More →

NHS patient data at risk in major cyber attack

A newly uncovered cyber attack has exposed sensitive information at two major NHS trusts, raising fears that patient records could be at risk. The attack, linked to a vulnerability in mobile management software, signifies a growing threat to critical UK infrastructure, as highlighted by cybersecurity firm EclecticIQ. University College London hospitals and University Hospital Southampton […]

Read More →

Adidas Admits Data Breach Following Third-Party Attack

Summary Adidas has experienced a data breach stemming from a third-party customer service provider, compromising the contact information of certain customers. The breach exposed names, email addresses, and phone numbers, sparking concerns over potential phishing attempts. Fortunately, payment and password data remain secure. In compliance, Adidas has begun notifying affected individuals and has alerted relevant […]

Read More →

Secure Data Connections to the Cloud

Summary In today’s world, the demand for process data has skyrocketed, alongside a significant increase in cybersecurity threats. Establishing secure data connections between operational technology (OT) and cloud systems is paramount, ideally achieving zero exposure to outside threats. Two main technologies for achieving this level of security are MQTT and tunnel/mirroring, with tunnel/mirroring offering some […]

Read More →

20 Top-Paying Cybersecurity Jobs To Watch In 2025

In the ever-evolving landscape of cybersecurity, the job market is booming, with a staggering demand for skilled professionals. This article highlights the top-paying cybersecurity roles to keep an eye on as we approach 2025, addressing a critical talent shortage and offering insights into the lucrative opportunities available. Source: Forbes Key Points The cybersecurity job market […]

Read More →